CSOL 570- Network Visualization and Vulnerability Detection is a required course for cybersecurity professionals because it focuses on network security and visualization when evaluating all possible threats and risks to any digital infrastructure.
During this course, students experienced a hands-on approach to various security tools commonly used to secure virtual networks and several penetration testing techniques using Kali-Linux, often used for monitoring and detecting any vulnerabilities.
Valuable Resources
CompTia. (2021). What Is Wireshark and How to Use It | Cybersecurity | CompTIA. Default.
Retrieved 13 August 2021, from https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-it.
GVS, C. (2020). Things to Consider While Choosing The Right Vulnerability Assessment Tool.
Appknox.com. Retrieved 14 August 2021, from https://www.appknox.com/blog/choosing-the-right-vulnerability-assessment-tool.
G2. (2020). Retrieved 14 August 2021, from
https://www.g2.com/categories/vulnerability-scanner.
Nessus. (2021). Nessus Product Family. Tenable®. Retrieved 13 August 2021, from
https://www.tenable.com/products/nessus.
Infosec Aphorisms. (2018). Discover Wireless Networks with Kismet. Youtube.com. Retrieved
13 August 2021, from https://www.youtube.com/watch?v=IBzUIgTwuYE.
ITPanther. (2020). Installing Grafana on Linux - Step by Step With Example. IT Panther.
Retrieved 14 August 2021, from https://www.itpanther.com/installing-grafana-on-linux/.
Kali Linux. (2021). Retrieved 14 August 2021, from https://www.kali.org/get-kali/.
Metasploitable 2. (2021). Metasploitable 2 | Metasploit Documentation. Docs.rapid7.com.
Retrieved 14 August 2021, from https://docs.rapid7.com/metasploit/metasploitable-2/.
Nmap. (2010). Chapter 9. Nmap Scripting Engine | Nmap Network Scanning. Nmap.org.
Retrieved 13 August 2021, from https://nmap.org/book/nse.html.
OpenManiak. (2008). Kismet - The Easy Tutorial - Installation. Openmaniak.com. Retrieved 13
August 2021, from https://openmaniak.com/kismet_install.php.
Oracle. (2013). 6.4. Installing the VirtualBox Guest Additions. Docs.oracle.com. Retrieved 13
August 2021, from https://docs.oracle.com/cd/E36500_01/E36502/html/qs-guest-additions.html.
OWASP Broken Web Applications Project Download. (2021). OWASP Broken Web
Applications Project. SourceForge. Retrieved 14 August 2021, from https://sourceforge.net/projects/owaspbwa/.
During this course, students experienced a hands-on approach to various security tools commonly used to secure virtual networks and several penetration testing techniques using Kali-Linux, often used for monitoring and detecting any vulnerabilities.
Valuable Resources
CompTia. (2021). What Is Wireshark and How to Use It | Cybersecurity | CompTIA. Default.
Retrieved 13 August 2021, from https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-it.
GVS, C. (2020). Things to Consider While Choosing The Right Vulnerability Assessment Tool.
Appknox.com. Retrieved 14 August 2021, from https://www.appknox.com/blog/choosing-the-right-vulnerability-assessment-tool.
G2. (2020). Retrieved 14 August 2021, from
https://www.g2.com/categories/vulnerability-scanner.
Nessus. (2021). Nessus Product Family. Tenable®. Retrieved 13 August 2021, from
https://www.tenable.com/products/nessus.
Infosec Aphorisms. (2018). Discover Wireless Networks with Kismet. Youtube.com. Retrieved
13 August 2021, from https://www.youtube.com/watch?v=IBzUIgTwuYE.
ITPanther. (2020). Installing Grafana on Linux - Step by Step With Example. IT Panther.
Retrieved 14 August 2021, from https://www.itpanther.com/installing-grafana-on-linux/.
Kali Linux. (2021). Retrieved 14 August 2021, from https://www.kali.org/get-kali/.
Metasploitable 2. (2021). Metasploitable 2 | Metasploit Documentation. Docs.rapid7.com.
Retrieved 14 August 2021, from https://docs.rapid7.com/metasploit/metasploitable-2/.
Nmap. (2010). Chapter 9. Nmap Scripting Engine | Nmap Network Scanning. Nmap.org.
Retrieved 13 August 2021, from https://nmap.org/book/nse.html.
OpenManiak. (2008). Kismet - The Easy Tutorial - Installation. Openmaniak.com. Retrieved 13
August 2021, from https://openmaniak.com/kismet_install.php.
Oracle. (2013). 6.4. Installing the VirtualBox Guest Additions. Docs.oracle.com. Retrieved 13
August 2021, from https://docs.oracle.com/cd/E36500_01/E36502/html/qs-guest-additions.html.
OWASP Broken Web Applications Project Download. (2021). OWASP Broken Web
Applications Project. SourceForge. Retrieved 14 August 2021, from https://sourceforge.net/projects/owaspbwa/.